Evolution Data Server provides a unified back-end for applications whichinteract with contacts, task and calendar information. Evolution DataServer was originally developed as a back-end for Evolution, but is nowused by multiple other applications.

Evolution did not properly check the Secure/Multipurpose Internet MailExtensions (S/MIME) signatures used for public key encryption and signingof e-mail messages. An attacker could use this flaw to spoof a signature bymodifying the text of the e-mail message displayed to the user. (CVE-2009-0547)

It was discovered that evolution did not properly validate NTLM (NT LANManager) authentication challenge packets. A malicious server using NTLMauthentication could cause evolution to disclose portions of its memory orcrash during user authentication. (CVE-2009-0582)

Multiple integer overflow flaws which could cause heap-based bufferoverflows were found in the Base64 encoding routines used by evolution andevolution-data-server. This could cause evolution, or an application usingevolution-data-server, to crash, or, possibly, execute an arbitrary codewhen large untrusted data blocks were Base64-encoded. (CVE-2009-0587)

All users of evolution and evolution-data-server are advised to upgrade tothese updated packages, which contain backported patches to correct theseissues. All running instances of evolution and evolution-data-server mustbe restarted for the update to take effect.

Solution

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.